MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7d4c7898c41aa62c9fffd5e495d2b438aa4f60639db581620dd94ee80e5f8ad6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 7d4c7898c41aa62c9fffd5e495d2b438aa4f60639db581620dd94ee80e5f8ad6
SHA3-384 hash: 5d6e27e471f9ed04a0011a49ab3dced2dd33519f019607f24f89065f7fa73829cf13e9e5fdc8c80995a49ccc92c0a6ca
SHA1 hash: 8ba6766a7de76f17689a3a1526691451b75a705b
MD5 hash: 5a9279cd52abaf91b209fd2c33120a35
humanhash: maryland-nevada-crazy-magazine
File name:SecuriteInfo.com.Variant.Tedy.207408.29282.17079
Download: download sample
Signature RedLineStealer
File size:3'620'352 bytes
First seen:2022-09-21 16:28:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2557b21b8e913903bc66159999899c81 (12 x RedLineStealer, 1 x ArkeiStealer)
ssdeep 98304:9bPGPVhUrRFnfqk6zZGqS557Mupq34Mz335:pPGNhUrDnfqk6zZ8bMupM4Mr35
TLSH T1BDF5631F6D6155FCC4A85AA940DF672F4220411E1A2DEF8E4A1C1FBB92F134AF71A24F
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter SecuriteInfoCom
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
284
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Variant.Tedy.207408.29282.17079
Verdict:
Suspicious activity
Analysis date:
2022-09-21 16:32:10 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Running batch commands
Creating a process from a recently created file
DNS request
Creating a file in the %temp% directory
Searching for the window
Creating a window
Сreating synchronization primitives
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
84 / 100
Signature
Antivirus detection for dropped file
Contains functionality to inject code into remote processes
Detected VMProtect packer
Drops PE files with benign system names
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 707294 Sample: SecuriteInfo.com.Variant.Te... Startdate: 21/09/2022 Architecture: WINDOWS Score: 84 53 Antivirus detection for dropped file 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 Detected VMProtect packer 2->57 59 Machine Learning detection for dropped file 2->59 9 SecuriteInfo.com.Variant.Tedy.207408.29282.17079.exe 2 2->9         started        13 explorer.exe 2->13         started        15 explorer.exe 2->15         started        process3 file4 43 SecuriteInfo.com.V...29282.17079.exe.log, ASCII 9->43 dropped 61 Contains functionality to inject code into remote processes 9->61 63 Drops PE files with benign system names 9->63 65 Injects a PE file into a foreign processes 9->65 17 SecuriteInfo.com.Variant.Tedy.207408.29282.17079.exe 2 5 9->17         started        21 conhost.exe 9->21         started        23 WerFault.exe 10 13->23         started        25 WerFault.exe 10 15->25         started        signatures5 process6 dnsIp7 45 94.26.226.51, 49697, 80 PTC-YEMENNETYE Russian Federation 17->45 47 afrigit.com 94.126.169.160, 49703, 49704, 49705 FLESK-ASPT Portugal 17->47 49 blackhk1.beget.tech 5.101.153.227, 49698, 49699, 49700 BEGET-ASRU Russian Federation 17->49 37 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32+ 17->37 dropped 39 C:\Users\user\AppData\...\explorer.exe, PE32+ 17->39 dropped 41 C:\Users\user\AppData\...\37HM38B2CEFF4G0.exe, PE32+ 17->41 dropped 27 37HM38B2CEFF4G0.exe 34 17->27         started        30 cmd.exe 1 17->30         started        file8 process9 signatures10 67 Antivirus detection for dropped file 27->67 69 Multi AV Scanner detection for dropped file 27->69 32 explorer.exe 30->32         started        process11 signatures12 51 Multi AV Scanner detection for dropped file 32->51 35 WerFault.exe 20 9 32->35         started        process13
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2022-09-21 16:29:12 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
22 of 25 (88.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
miner persistence vmprotect
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Detectes Phoenix Miner Payload
Unpacked files
SH256 hash:
e778d6c0d1dad9c2fb21c005cd2d5f497c49bf1648cd4c26e4fc136ff9eea240
MD5 hash:
cadb5077efad198f11e592d19171dd41
SHA1 hash:
9679dfdcec5207d47b43563f53ebba0e19c71c34
SH256 hash:
7d4c7898c41aa62c9fffd5e495d2b438aa4f60639db581620dd94ee80e5f8ad6
MD5 hash:
5a9279cd52abaf91b209fd2c33120a35
SHA1 hash:
8ba6766a7de76f17689a3a1526691451b75a705b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 7d4c7898c41aa62c9fffd5e495d2b438aa4f60639db581620dd94ee80e5f8ad6

(this sample)

  
Delivery method
Distributed via web download

Comments